
Samuel Ambaye
Examiner (ID: 18802)
| Most Active Art Unit | 2433 |
| Art Unit(s) | 2433 |
| Total Applications | 741 |
| Issued Applications | 598 |
| Pending Applications | 48 |
| Abandoned Applications | 116 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13322897
[patent_doc_number] => 20180212986
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-26
[patent_title] => NETWORK ATTACK DETECTION METHOD AND DEVICE
[patent_app_type] => utility
[patent_app_number] => 15/745057
[patent_app_country] => US
[patent_app_date] => 2016-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7344
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15745057
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/745057 | Network attack detection method and device | Aug 16, 2016 | Issued |
Array
(
[id] => 17284687
[patent_doc_number] => 11201736
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-12-14
[patent_title] => Management device, management system, key generation device, key generation system, key management system, vehicle, management method, key generation method, and computer program
[patent_app_type] => utility
[patent_app_number] => 15/747992
[patent_app_country] => US
[patent_app_date] => 2016-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 18
[patent_no_of_words] => 16816
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15747992
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/747992 | Management device, management system, key generation device, key generation system, key management system, vehicle, management method, key generation method, and computer program | Aug 3, 2016 | Issued |
Array
(
[id] => 13336669
[patent_doc_number] => 20180219873
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-02
[patent_title] => COMMUNICATION SYSTEM, COUNT VALUE SYNCHRONIZATION METHOD, AND COUNT VALUE SYNCHRONIZATION PROGRAM PRODUCT
[patent_app_type] => utility
[patent_app_number] => 15/747509
[patent_app_country] => US
[patent_app_date] => 2016-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4559
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -4
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15747509
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/747509 | Communication system, count value synchronization method, and count value synchronization program product | Aug 3, 2016 | Issued |
Array
(
[id] => 13801873
[patent_doc_number] => 20190014475
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-10
[patent_title] => Electronic Device Connection Method
[patent_app_type] => utility
[patent_app_number] => 15/748718
[patent_app_country] => US
[patent_app_date] => 2016-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2684
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -7
[patent_words_short_claim] => 80
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15748718
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/748718 | Electronic Device Connection Method | Jul 31, 2016 | Abandoned |
Array
(
[id] => 13850005
[patent_doc_number] => 20190028487
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-24
[patent_title] => Indirect Authorization Transport
[patent_app_type] => utility
[patent_app_number] => 15/755694
[patent_app_country] => US
[patent_app_date] => 2016-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4864
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15755694
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/755694 | Indirect Authorization Transport | Jul 26, 2016 | Abandoned |
Array
(
[id] => 13337293
[patent_doc_number] => 20180220185
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-02
[patent_title] => DEVICE AND METHOD FOR MODIFYING A STREAM OF ENCRYPTED MULTIMEDIA DATA
[patent_app_type] => utility
[patent_app_number] => 15/747608
[patent_app_country] => US
[patent_app_date] => 2016-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8485
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15747608
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/747608 | DEVICE AND METHOD FOR MODIFYING A STREAM OF ENCRYPTED MULTIMEDIA DATA | Jul 24, 2016 | Abandoned |
Array
(
[id] => 11124796
[patent_doc_number] => 20160321770
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-03
[patent_title] => 'AUTOMATED LICENSE MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 15/210387
[patent_app_country] => US
[patent_app_date] => 2016-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6836
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15210387
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/210387 | Automated license management | Jul 13, 2016 | Issued |
Array
(
[id] => 11496699
[patent_doc_number] => 20170070883
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-09
[patent_title] => 'REMOTE GRANT OF NETWORK ACCESS'
[patent_app_type] => utility
[patent_app_number] => 15/208162
[patent_app_country] => US
[patent_app_date] => 2016-07-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 22825
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15208162
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/208162 | REMOTE GRANT OF NETWORK ACCESS | Jul 11, 2016 | Abandoned |
Array
(
[id] => 11119005
[patent_doc_number] => 20160315979
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-27
[patent_title] => 'CUSTOMIZED INFORMATION SETUP, ACCESS AND SHARING DURING A LIVE CONFERENCE'
[patent_app_type] => utility
[patent_app_number] => 15/201425
[patent_app_country] => US
[patent_app_date] => 2016-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 5595
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15201425
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/201425 | Customized information setup, access and sharing during a live conference | Jul 1, 2016 | Issued |
Array
(
[id] => 11752651
[patent_doc_number] => 09710666
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-18
[patent_title] => 'Methods and systems for user authentication in a computer system using multi-component log-ins, including image-based log-ins'
[patent_app_type] => utility
[patent_app_number] => 15/197899
[patent_app_country] => US
[patent_app_date] => 2016-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 13126
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15197899
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/197899 | Methods and systems for user authentication in a computer system using multi-component log-ins, including image-based log-ins | Jun 29, 2016 | Issued |
Array
(
[id] => 15758445
[patent_doc_number] => 10621338
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-04-14
[patent_title] => Method to detect forgery and exploits using last branch recording registers
[patent_app_type] => utility
[patent_app_number] => 15/197656
[patent_app_country] => US
[patent_app_date] => 2016-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6851
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15197656
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/197656 | Method to detect forgery and exploits using last branch recording registers | Jun 28, 2016 | Issued |
Array
(
[id] => 16745391
[patent_doc_number] => 10970381
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-04-06
[patent_title] => System for identifying unauthorized signals on a data bus
[patent_app_type] => utility
[patent_app_number] => 15/579234
[patent_app_country] => US
[patent_app_date] => 2016-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4263
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15579234
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/579234 | System for identifying unauthorized signals on a data bus | Jun 12, 2016 | Issued |
Array
(
[id] => 14825923
[patent_doc_number] => 10409971
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-10
[patent_title] => System and method for secretive storage of applications in portable computing device
[patent_app_type] => utility
[patent_app_number] => 15/179106
[patent_app_country] => US
[patent_app_date] => 2016-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 5434
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 502
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15179106
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/179106 | System and method for secretive storage of applications in portable computing device | Jun 9, 2016 | Issued |
Array
(
[id] => 13294551
[patent_doc_number] => 10158481
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-12-18
[patent_title] => Apparatus and methods for quantum key distribution
[patent_app_type] => utility
[patent_app_number] => 15/179583
[patent_app_country] => US
[patent_app_date] => 2016-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 19
[patent_no_of_words] => 15466
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15179583
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/179583 | Apparatus and methods for quantum key distribution | Jun 9, 2016 | Issued |
Array
(
[id] => 13696773
[patent_doc_number] => 20170359341
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-14
[patent_title] => DATA ACCESS CONTROL BASED ON STORAGE VALIDATION
[patent_app_type] => utility
[patent_app_number] => 15/178315
[patent_app_country] => US
[patent_app_date] => 2016-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8001
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 58
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15178315
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/178315 | Data access control based on storage validation | Jun 8, 2016 | Issued |
Array
(
[id] => 15643323
[patent_doc_number] => 10594683
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-17
[patent_title] => Enforce data security based on a mobile device, positioning, augmented reality
[patent_app_type] => utility
[patent_app_number] => 15/176832
[patent_app_country] => US
[patent_app_date] => 2016-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7870
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 68
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15176832
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/176832 | Enforce data security based on a mobile device, positioning, augmented reality | Jun 7, 2016 | Issued |
Array
(
[id] => 16219623
[patent_doc_number] => 10735455
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-04
[patent_title] => System for anonymously detecting and blocking threats within a telecommunications network
[patent_app_type] => utility
[patent_app_number] => 15/174775
[patent_app_country] => US
[patent_app_date] => 2016-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 15
[patent_no_of_words] => 9941
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 277
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15174775
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/174775 | System for anonymously detecting and blocking threats within a telecommunications network | Jun 5, 2016 | Issued |
Array
(
[id] => 17003586
[patent_doc_number] => 11082422
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-03
[patent_title] => Authentication manager
[patent_app_type] => utility
[patent_app_number] => 15/172750
[patent_app_country] => US
[patent_app_date] => 2016-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9081
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15172750
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/172750 | Authentication manager | Jun 2, 2016 | Issued |
Array
(
[id] => 13949097
[patent_doc_number] => 10210325
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-02-19
[patent_title] => Extracting and detecting malicious instructions on a virtual machine
[patent_app_type] => utility
[patent_app_number] => 15/169304
[patent_app_country] => US
[patent_app_date] => 2016-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 13117
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 303
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15169304
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/169304 | Extracting and detecting malicious instructions on a virtual machine | May 30, 2016 | Issued |
Array
(
[id] => 11133201
[patent_doc_number] => 20160330177
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-10
[patent_title] => 'Password Encryption for Hybrid Cloud Services'
[patent_app_type] => utility
[patent_app_number] => 15/149707
[patent_app_country] => US
[patent_app_date] => 2016-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 17124
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15149707
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/149707 | Password encryption for hybrid cloud services | May 8, 2016 | Issued |